(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

The IP.com Prior Art Database

Abstract

Applications implement role-based security (e.g. only finance can see billing records) in their application through application filter; they has potential SQL injection risk as the shared database account. There should be some mechanism to help prevent the un-authorized access to application's data. One way to make more secured protection is protect at the database level. Some mature database (DB2,Oracle) has provided some row based access control mechanism to protect data in database layer.
But the problem is for already build applications that without carefully design originally,it's difficult as it will requires a lot of code changes of the application to enable the role-based security policy. Also if the policy changes, there will be additional effort for rewrite application again and also migrate the data to new authorization structure.
In this invention, we propose a mechanism & apparatus to transparently enable role-based security by leveraging row based ACL in database layer( such as LBAC) for legacy applications. Our invention will not requires code changes of application and very flexible and adaptable for changes of role & authority mapping. In details, we provide the management toolkits to automatically generate LBAC elements from application role structure, and transform the legacy database schema and business data to enable LBAC feature, also provide the runtime database access libraries (JDBC driver) to enable the legacy application instance to access LBAC based database (e.g. transformed by the mgmt toolkits above) transparently without changing the source code of the legacy application.

Country

Undisclosed

Language

English (United States)

This text was extracted from a PDF file.

This is the abbreviated version, containing approximately
56% of the total text.